A photograph of a cardboard evidence box. The box is marked with the handwritten case identifier '31E-NY-3027571-1B27' and '1B27', suggesting it is part of an FBI investigation (likely New York field office). The shipping label is redacted.
A photograph showing two yellow padded evidence envelopes resting on a Smead file folder. The visible label on the left envelope identifies the contents as 'HQQ019336', which is a 'Clone of HQQ019334 - Bay 2 of Main Controller'. This indicates the envelopes contain digital forensic copies of hard drives seized from a main controller system (likely surveillance or server infrastructure). The Lab ID HQ0190816001 suggests the evidence was processed on August 16, 2019.
A photograph of a computer hard drive sealed in a pink anti-static evidence bag, resting on a brown Smead file folder. The hard drive has a label attached that reads 'DVR 2 ARRAY CONTROLLER' and 'TOP BAY CLONE' in red text, suggesting it is a forensic copy of surveillance footage data. The document is marked with the Bates number EFTA00008476.
This image shows two LTO-6 magnetic tape cartridges labeled as FBI evidence (Item 1B 53, Case 90A-NY-3151227). The labels indicate the tapes contain a 'Master Copy' of a CART Network archive of video images taken from MCC-NY (Metropolitan Correctional Center New York) video recorder hard drives as of June 21, 2021. The tapes are dated July 23, 2021, and sit atop an FBI Chain of Custody form (FD-1004).
This document is a photograph of a physical piece of evidence: a Western Digital hard drive sealed in an anti-static bag. An FBI evidence label attached to the drive identifies it as 'Specimen HQQ026639' related to case 'UCFN: 90A-NY-3151227' (the code 90A typically relates to child exploitation matters). The label describes the contents as a 'Master Copy' containing archives of 'DVR 2 Controller images,' 'repaired drive images,' and 'Video Exports,' suggesting this drive contains recovered surveillance footage relevant to the investigation. The Lab number HQQ190816001 indicates the evidence was processed on August 16, 2019.
This document is a photograph of a 10TB Seagate IronWolf hard drive packaged in an evidence bag. The drive bears a label identifying its contents as a 'Master Copy: Archive of DVR 1 Images', suggesting it contains surveillance footage relevant to the investigation. The label includes FBI-style case identifiers: Lab # HQQ190816001 (indicating a date of August 16, 2019, shortly after Jeffrey Epstein's death) and UCFN 90A-NY-3151227 (indicating an Obscene Matter case out of the New York office). The drive itself was manufactured in November 2018.
This document is a photograph of an evidence bag containing a 2.0TB Western Digital hard drive. The label identifies the contents as a 'Master Copy: Archive of DVR Main Controller Images,' suggesting it contains security camera footage. The evidence label bears the case file number '90A-NY-3151227' (an FBI code for a matter involving a minor in New York) and a Lab number 'HQQ190816001', indicating the evidence was processed on or around August 16, 2019.
This image is a photograph of physical evidence consisting of a computer hard drive sealed inside a pink anti-static protective bag. The bagged drive is resting on a brown Smead file folder (Model No. 1056EL). The image is stamped with the evidence identifier EFTA00008464. No specific data, dates, or names are legible on the hard drive itself due to the packaging and image quality.
A photograph showing a piece of physical evidence, likely digital media (hard drive or disk), sealed in a plastic evidence bag. The bag is handwritten with 'SDA - NY - 3151227' and '2B46'. Inside, a label visible through the plastic reads 'NY-BACKUP' with a file path pointing to a server '\\NYCART-FS\CASES02' and a timestamp of November 18, 2019, suggesting this is a forensic backup of digital evidence processed after the initial investigation timeline.
A photograph showing a Seagate hard drive sealed inside a clear anti-static evidence bag. The drive bears a label reading 'BAY 14 CLONE' and 'PIM 08004', suggesting it is a forensic copy or evidence item. The item is resting on a Smead file folder and marked with the Bates number EFTA00008458.
This document is a photograph of physical evidence, specifically a Seagate hard drive sealed inside a pink anti-static evidence bag. The bag is resting on a brown Smead file folder. Handwritten initials or markings are visible on the plastic bag in black marker. The image bears the Bates stamp EFTA00008456.
This image depicts a piece of physical evidence: a Seagate Barracuda 7200.10 500GB hard drive sealed in an anti-static bag. The drive has a piece of blue painter's tape on it with handwritten text reading 'Helen' followed by an illegible word and the date '9/19/06'. The evidence is marked with the Bates stamp EFTA00008454.
This document is a photograph of a sealed evidence bag containing a Seagate Barracuda 1000GB hard drive (Evidence ID 1B30). The yellow label indicates this drive is a forensic 'Derivative Copy' or clone of another hard drive (Evidence ID 1B10, a Seagate Barracuda 500GB), created on August 12, 2019, by an individual with initials PC in connection with case 90A-NY-3151227.
This is a photograph of an evidence bag containing a Seagate Barracuda 1000GB hard drive (Item 1B24). The label indicates it is a forensic 'Derivative Copy' (clone) of another hard drive (Item 1B3, a 500GB Seagate) created on August 12, 2019, in connection with case 90A-NY-3151227.
This document is a photograph of an evidence box labeled 'RX18' containing item 1B42. The green label identifies the contents as an FBI-owned Hitachi 2TB Hard Drive created on August 21, 2019. The drive is a 'Master Copy' containing verified forensic E01 images of other evidence items (1B12, 1B16, 1B17, and 1B18), associated with case number 90A-NY-3151227.
This document is a photograph of physical evidence, specifically a sealed anti-static bag containing a Seagate hard drive labeled as item 1B22. The label details a forensic operation performed on August 12, 2019, where a clone copy was made from a source hard drive (Item 1B1, 500GB) onto this destination drive (1000GB) using a Tableau TX-1 forensic imager. The case identifier 90A-NY-3151227 suggests an FBI investigation based in New York.
This document is a photograph of an evidence bag containing a hard drive. The label identifies the contents as item 1B33, a Western Digital 1TB hard drive containing a forensic clone of item 1B15, a Seagate Barracuda 500GB hard drive. The evidence was processed on August 12, 2019, in connection with case 90A-NY-3151227.
A photograph of an evidence bag containing a Hitachi 1TB hard drive. The label identifies this item (1B23) as a 'PC Derivative Copy' or forensic clone of another hard drive (item 1B2, a Hitachi 500GB drive) related to case 90A-NY-3151227. The cloning process took place on August 12, 2019, using a Tableau TX-1 forensic imager.
A photograph of physical evidence consisting of a Seagate 1000GB Desktop Hard Drive inside an anti-static bag. The drive bears an official label from the 'New York CART Lab' (FBI Computer Analysis Response Team) with the identifier 'N: 6327:08' and references a 'DVR 2 DISK ARRAY'. A handwritten label identifies this specific drive as 'Clone #9', suggesting it is a forensic copy of data from a digital video recorder system. The document bears the Bates number EFTA00008432.
This is a photograph of a physical piece of evidence: a 1000GB Seagate Barracuda hard drive sealed in a pink anti-static evidence bag. The drive is marked with a handwritten label 'Clone # 11' and a printed label 'DVR 2 DISK ARRAY', suggesting it contains cloned data from a digital video recorder (surveillance system). It bears a 'New York CART Lab' asset tag with the ID 'NYC027740'.
This is a photograph of physical evidence, specifically a Seagate hard drive (labeled as a 4TB 2 Disk Array) contained within a sealed anti-static bag. The drive bears a forensic label from the 'New York CART Lab' (Computer Analysis Response Team) and is handwritten with the identifier 'Clone #4'. The evidence is placed on top of a brown Smead file folder and has the Bates stamp EFTA00008428.
A photograph of a piece of physical evidence: a Seagate Barracuda 1000GB hard drive encased in plastic packaging. The green label identifies it as evidence item 1B36 in case 90A-NY-3151227. It is described as a 'PC Derivative Copy' (forensic clone) created on 08/12/2019, containing the clone of another hard drive (item 1B18, a 500GB Seagate). The evidence tape is signed with initials 'TC' and dated 8/16/19.
This document is a photograph of physical evidence, specifically a sealed Seagate 1TB hard drive (Item 1B35). The label indicates it is a forensic clone created on August 12, 2019, containing a copy of another hard drive (Item 1B17, a 500GB Seagate Constellation). The evidence was processed in connection with case 90A-NY-3151227.
This document is a photograph of a physical evidence bag containing a hard drive, labeled as Item 1B32. The label indicates that on August 12, 2019, a forensic clone ('derivative copy') was made from a 500GB Seagate hard drive (Item 1B12) onto a 1000GB Seagate hard drive (Item 1B32) using a Tableau TX-1 imager. The evidence is associated with case number 90A-NY-3151227.
This document is a photograph of physical evidence: a Seagate 500GB hard drive (S/N W2AEXSJV) sealed in a plastic container. The label indicates it contains a 'Master Copy' of video surveillance footage from the Metropolitan Correctional Center (MCC) downloaded from DVR1. The footage covers the Special Housing Unit (SHU) floor 9 and Attorney Visit area floor 3 from July 23, 2019, to August 10, 2019, the date of Jeffrey Epstein's death. The label notes a failed download for 8/9 and mentions a 'wrong camera' issue.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity